base control objective:
The information system prevents unauthorized and unintended information transfer via shared system resources.

supplemental objective information:
The purpose of this control is to prevent information, including encrypted representations of information, produced by the actions of a prior user/role (or the actions of a process acting on behalf of a prior user/role) from being available to any current user/role (or current process) that obtains access to a shared system resource (e.g., registers, main memory, secondary storage) after that resource has been released back to the information system. Control of information in shared resources is also referred to as object reuse. This control does not address: (i) information remanence which refers to residual representation of data that has been in some way nominally erased or removed; (ii) covert channels where shared resources are manipulated to achieve a violation of information flow restrictions; or (iii) components in the information system for which there is only a single user/role.

enhancements to the base objective:

(1) The information system does not share resources that are used to interface with systems operating at different security levels.
Enhancement Supplemental Guidance: Shared resources include, for example, memory, input/output queues, and network interface cards.